Which of the following is a software vulnerability that can be avoided by using input validation?

A. Buffer overflow
B. Application fuzzing
C. Incorrect input
D. Error handling


Answer: C. Incorrect input

Computer Science & Information Technology

You might also like to view...

Which of the following is true?

a. You should maintain a separate database connection for each client request. b. You should use a connection pool that allows the server to manage a limited number of database connections and share them among requests. c. You should never connect to databases from web apps. d. None of the above.

Computer Science & Information Technology

Someone who does not understand proper database design will generally structure a database like a ________

A) text message B) spreadsheet C) document D) website

Computer Science & Information Technology

An Emphasis effect is an animation that appears as an object or text is moved onto the screen

Indicate whether the statement is true or false

Computer Science & Information Technology

"Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance. __________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology